{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:48:17Z","timestamp":1747176497363,"version":"3.40.5"},"reference-count":23,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1080\/01611194.2023.2259376","type":"journal-article","created":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T11:42:05Z","timestamp":1697024525000},"page":"427-436","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Leo Marks\u2019 \u201cmental one-time pad\u201d: an experimental cipher for British special operations in World War II"],"prefix":"10.1080","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6392-314X","authenticated-orcid":false,"given":"Thomas","family":"Larsen","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2023,10,11]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.3384\/ecp2020171004"},{"key":"e_1_3_2_3_1","volume-title":"Report on information obtained from PW CS\/495 Uffz Miersemann","author":"CSDIC","year":"1944","unstructured":"CSDIC. 1944. Report on information obtained from PW CS\/495 Uffz Miersemann. Brussels: Combined Services Detailed Interrogation Centre (CSDIC)."},{"key":"e_1_3_2_4_1","volume-title":"Department of the army technical manual TM 32\u2013220: Basic cryptography","author":"Department of the Army","year":"1950","unstructured":"Department of the Army. 1950. Department of the army technical manual TM 32\u2013220: Basic cryptography. Washington: United States Government Printing Office."},{"key":"e_1_3_2_5_1","volume-title":"Codebreaking: A practical guide","author":"Dunin E.","year":"2020","unstructured":"Dunin, E., and K. Schmeh. 2020. Codebreaking: A practical guide. London: Hachette UK."},{"key":"e_1_3_2_6_1","volume-title":"Encyclopaedia Britannica","author":"Friedman W.","year":"1954","unstructured":"Friedman, W. 1954. Codes and ciphers (cryptology). In: Encyclopaedia Britannica. London: Encyclopaedia Britannica."},{"key":"e_1_3_2_7_1","volume-title":"Methods for the solution of running-key ciphers","author":"Friedman W. F.","year":"1918","unstructured":"Friedman, W. F. 1918. Methods for the solution of running-key ciphers. Illinois: Riverbank Laboratories."},{"key":"e_1_3_2_8_1","volume-title":"Military cryptanalysis, part I: Monoalphabetic substitution systems","author":"Friedman W. F.","year":"1938","unstructured":"Friedman, W. F. 1938. Military cryptanalysis, part I: Monoalphabetic substitution systems. Washington: United States Government Printing Office."},{"key":"e_1_3_2_9_1","volume-title":"Military cryptanalysis, part II: Simpler varieties of polyalphabetic substitution systems","author":"Friedman W. F.","year":"1938","unstructured":"Friedman, W. F. 1938. Military cryptanalysis, part II: Simpler varieties of polyalphabetic substitution systems. Washington: United States Government Printing Office."},{"key":"e_1_3_2_10_1","volume-title":"Military cryptanalysis, part III: Aperiodic substitution systems","author":"Friedman W. F.","year":"1939","unstructured":"Friedman, W. F. 1939. Military cryptanalysis, part III: Aperiodic substitution systems. Washington: United States Government Printing Office."},{"key":"e_1_3_2_11_1","volume-title":"Military cryptanalysis, part IV: Transposition and fractionating systems","author":"Friedman W. F.","year":"1939","unstructured":"Friedman, W. F. 1939. Military cryptanalysis, part IV: Transposition and fractionating systems. Washington: United States Government Printing Office."},{"key":"e_1_3_2_12_1","volume-title":"The codebreakers: The comprehensive history of secret communication from ancient times to the internet","author":"Kahn D.","year":"1996","unstructured":"Kahn, D. 1996. The codebreakers: The comprehensive history of secret communication from ancient times to the internet. New York: Scribner."},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2015.1028679"},{"key":"e_1_3_2_14_1","volume-title":"General solution for the double transposition cipher","author":"Kullback S.","year":"1934","unstructured":"Kullback, S. 1934. General solution for the double transposition cipher. Washington: United States Government Printing Office."},{"key":"e_1_3_2_15_1","volume-title":"A methodology for the cryptanalysis of classical ciphers with search metaheuristics","author":"Lasry G.","year":"2018","unstructured":"Lasry, G. 2018. A methodology for the cryptanalysis of classical ciphers with search metaheuristics. Kassel: Kassel University Press."},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2016.1169461"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2014.915269"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2015.1087074"},{"key":"e_1_3_2_19_1","volume-title":"The secret history of SOE: Special operations executive, 1940-1945","author":"Mackenzie W. J. M.","year":"2000","unstructured":"Mackenzie, W. J. M. 2000. The secret history of SOE: Special operations executive, 1940-1945. London: St Ermin\u2019s Press."},{"key":"e_1_3_2_20_1","volume-title":"Between silk and cyanide: The story of SOE\u2019s code war","author":"Marks L.","year":"1998","unstructured":"Marks, L. 1998. Between silk and cyanide: The story of SOE\u2019s code war. London: HarperCollins."},{"key":"e_1_3_2_21_1","volume-title":"The cryptology of the German intelligence services.","author":"Mowry D.","year":"1989","unstructured":"Mowry, D. 1989. The cryptology of the German intelligence services. Office of Archives and History, National Security Agency\/Central Security Service, Washington."},{"key":"e_1_3_2_22_1","volume-title":"How to be a spy: The World War II SOE training manual","author":"Rigden D.","year":"2004","unstructured":"Rigden, D. 2004. How to be a spy: The World War II SOE training manual. Toronto: Dundurn."},{"key":"e_1_3_2_23_1","volume-title":"The storm of war: A new history of the Second World War","author":"Roberts A.","year":"2009","unstructured":"Roberts, A. 2009. The storm of war: A new history of the Second World War. London: Penguin UK."},{"key":"e_1_3_2_24_1","volume-title":"The code book: The science of secrecy from ancient Egypt to quantum cryptography","author":"Singh S.","year":"2000","unstructured":"Singh, S. 2000. The code book: The science of secrecy from ancient Egypt to quantum cryptography. New York: Anchor."}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2023.2259376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T02:34:27Z","timestamp":1727231667000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2023.2259376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,11]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9,2]]}},"alternative-id":["10.1080\/01611194.2023.2259376"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2023.2259376","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"type":"print","value":"0161-1194"},{"type":"electronic","value":"1558-1586"}],"subject":[],"published":{"date-parts":[[2023,10,11]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-10-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}